Non-institutional learning technologies, risks and responsibilities: a critical discourse analysis of university artefacts
Non-institutional technologies include external or third-party technologies that are not officially sanctioned or supported by higher education institutions (HEIs) but may be used by staff for educational purposes. These include free, open-source and open-access technologies such as social media sites, apps and online services. The literature identifies a number of risks and ethical considerations when using digital technologies, such as security, safety, privacy and legal compliance (Common Sense n.d.). This study analyses institutional artefacts, including policy and guidance documents, to explore how institutions are addressing the risks of educational technologies identified throughout the literature.
Critical discourse analysis was conducted on nine artefacts, obtained from seven UK HEIs. The study found that institutional policies and guidance documents do not sufficiently address some of the key risks identified in the literature (e.g. security risks), nor consider the ethical issues emerging from the use of profit-making educational products. Users of these technologies (including teaching staff) are assigned a broad range of complex and potentially time-consuming responsibilities concerning the evaluation, selection and operation of these technologies. For example, to ensure compliance with data protection legislation, however, no artefact stated how this should be achieved. The study therefore identifies significant inadequacies in institutional policies and guidelines, and questions whether appropriate quality assurance processes and safeguards are in place when non-institutional technologies are used for higher education.
Akande, A. O. & Van Belle, J. (2016) ‘The use of software as a service by students in higher education institutions: a systematic literature review’, ACM Press, pp. 1–6. doi: 10.1145/2971603.2971604.
Alim, F., et al., (2017) ‘Spying on students: school-issued devices and student privacy’, Electronic Frontier Foundation (EFF), [online] Available at: https://www.eff.org/wp/school-issued-devices-and-student-privacy
Arpaci, I., Kilicer, K. & Bardakci, S. (2015) ‘Effects of security and privacy concerns on educational use of cloud services’, Computers in Human Behavior, vol. 45, pp. 93–98. doi: 10.1016/j.chb.2014.11.075.
Author (2019) ‘An investigation of medical students’ perception and willingness to use personal digital devices (PDDs) for classroom learning’, Manuscript in Preparation.
Aymerich-Franch, L. & Fedele, M. (2014) ‘Students’ privacy concerns on the use of social media in higher education’, in Cutting-Edge Technologies and Social Media Use in Higher Education, eds V. Benson & S. Morgan, IGI Global, Hershey, PA, pp. 54–75.
Boag-Munroe, G. (2004) ‘Wrestling with words and meanings: finding a tool for analysing language in activity theory’, Educational Review, vol. 56, no. 2, pp. 165–182. doi: 10.1080/0031910410001693254
Bowen, G. A. (2009) ‘Document analysis as a qualitative research method’, Qualitative Research Journal, vol. 9, no. 2, pp. 27–40. doi: 10.3316/QRJ0902027
Brandtzaeg, P. B., Pultier, A. & Moen, G. M. (2018) ‘Losing control to data-hungry apps: a mixed-methods approach to mobile app privacy’, Social Science Computer Review. doi: 10.1177/0894439318777706
Chatzigavriil, A. et al., (2014) 2014 Survey of Technology Enhanced Learning: Case Studies, [online] Available at: http://www.ucisa.ac.uk/groups/dsdg/asg/~/media/7BCB3F2FF0E141A79A66BC87DDB34A14.ashx
Coffey, A. (2014) ‘Analysing documents’, in The SAGE Handbook of Qualitative Data Analysis, Sage, London, United Kingdom, pp. 367–379, [online] Available at: http://methods.sagepub.com/book/the-sage-handbook-of-qualitative-data-analysis/n25.xml
Common Sense (n.d.) Standard Privacy Report Questions, [online] Available at: https://privacy.commonsense.org/resource/standard-privacy-report-questions
Conole, G. (2013) Designing for Learning in an Open World, Springer, New York.
Conole, G. & Alevizou, P. (2010) A Literature Review of the Use of Web 2.0 Tools in Higher Education, [online] Available at: https://www.heacademy.ac.uk/system/files/conole_alevizou_2010.pdf
Fairclough, N. (1993) Discourse and Social Change, Polity Press, Cambridge.
Fairclough, N. (2001) ‘Critical discourse analysis as a method in social scientific research’, in Methods of Critical Discourse Analysis, eds R. Wodak & M. Meyer, Sage, London, pp. 121–138.
Fairclough, N. (2003) Analysing Discourse: Textual Analysis for Social Research, Routledge, London.
Farahmand, F., Yadav, A. & Spafford, E. H. (2013) ‘Risks and uncertainties in virtual worlds: an educators’ perspective’, Journal of Computing in Higher Education, vol. 25, no. 2, pp.49–67. doi: 10.1007/s12528-013-9067-5
Flöck, I. (2016). Requests in American and British English: A Contrastive Multi-Method Analysis, John Benjamins Publishing Company, Amsterdam.
Gadd, E. & Weedon, R. (2017) ‘Copyright ownership of e-learning and teaching materials: policy approaches taken by UK universities’, Education and Information Technologies. doi: 10.1007/s10639-017-9583-4
Garrett, B. M., MacPhee, M. & Jackson, C. (2013) ‘Evaluation of an eportfolio for the assessment of clinical competence in a baccalaureate nursing program’, Nurse Education Today, vol. 33, no. 10, pp. 1207–1213. doi: 10.1016/j.nedt.2012.06.015
Hall, R. (2013) ‘Educational technology and the enclosure of academic labour inside public higher education’, Journal for Critical Education Policy Studies, vol. 11, no. 3, pp. 52–82. [online] Available at: http://www.jceps.com/archives/437
Halliday, M. A. K. & Matthiessen, C. M. I. M. (2013) Halliday’s Introduction to Functional Grammar, [online] Available at: https://www.routledge.com/Hallidays-Introduction-to-Functional-Grammar-4th-Edition/Halliday-Matthiessen/p/book/9780203431269
Hardré, P. L. (2016) ‘When, how, and why do we trust technology too much?’, in Emotions, Technology, and Behaviors, eds S. Y. Tettegah & D. L. Espelage, Elsevier, pp. 85–106, [online] Available at: http://linkinghub.elsevier.com/retrieve/pii/B9780128018736000054
Herold, B. (2018) ‘How (and why) ed-tech companies are tracking students’ feelings’, Education Week, vol. 37, no. 36, pp. 14–15.
HESA (n.d.) Student Numbers by HE Provider and Subject of Study, [online] Available at: https://www.hesa.ac.uk/data-and-analysis/students/whos-in-he
Janks, H. (1997) ‘Critical discourse analysis as a research tool’, Discourse: Studies in the Cultural Politics of Education, vol. 18, no. 3, pp. 329–342. doi: 10.1080/0159630970180302
Kelly, G., et al., (2018a) 2018 State of Edtech Security Survey, Common Sense, San Francisco, CA, [online] Available at: https://www.commonsense.org/education/articles/2018-state-of-edtech-security-survey
Kelly, G., Graham, J. & Fitzgerald, B. (2018b) 2018 State of Edtech Privacy Report, Common Sense, San Francisco, CA, [online] Available at: https://www.commonsense.org/education/sites/default/files/tlr-blog/cs-state-of-edtech-privacy-report.pdf
Lenartz, A. J. (2012). ‘Establishing guidelines for the use of social media in higher education’, in Misbehavior Online in Higher Education, eds L. A. Wankel & C. Wankel, Emerald, Bingley, UK, pp. 333–354.
Lindh, M. & Nolin, J. (2016). ‘Information we collect: Surveillance and privacy in the implementation of Google apps for education’, European Educational Research Journal, vol. 15, no. 6, pp. 644–663. doi: 10.1177/1474904116654917
Lorenz, B., Kalde, K. & Kikkas, K. (2012) ‘Trust and security issues in cloud-based learning and management’, in Advances in Web-Based Learning – ICWL 2012, eds E. Popescu et al., Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 99–108.
Lorenz, B., Sousa, S. & Tomberg, V. (2013) ‘Privacy awareness of students and its impact on online learning participation – A case study’, in Open and Social Technologies for Networked Learning, eds T. Ley et al., Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 189–192.
Martin, J. R. (1992) ‘Macro proposals: meaning by degree’, in Discourse Description: Diverse Linguistic Analyses of a Fund-Raising Text, eds W. C. Mann & S. Thompson, Benjamins, Amsterdam, pp. 359–396.
McNeill, T. (2012) ‘“Don’t affect the share price”: social media policy in higher education as reputation management’, Research in Learning Technology, vol. 20, no. Suppl. 1, p. 19194. doi: 10.3402/rlt.v20i0.19194
Miller, K. W., Voas, J. & Hurlburt, G. F. (2012) ‘BYOD: security and privacy considerations’, IT Professional, vol. 14, no. 5, pp. 53–55. doi: 10.1109/MITP.2012.93
Mishra, P. & Koehler, M. J. (2006) ‘Technological pedagogical content knowledge: a framework for teacher knowledge’, Teachers College Record, vol. 108, no. 6, pp. 1017–1054. [online] Available at: https://www.learntechlib.org/p/99246/?nl=1
Moher, D., et al., (2009) ‘Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement’, PLoS Medicine, vol. 6, no. 7, p. e1000097. doi: 10.1371/journal.pmed.1000097
Newland, B., Martin, L. & Ramsden, A. (2011). ‘eSubmission – UK policies, practice and support’, Proceedings of the European Conference on E-Learning, 2011, Brighton, UK.
O’Connell, C. (2015) ‘Close-up examination of discourses associated with global university rankings: counter-narratives in UK policy context: discourses associated with GURs’, Higher Education Quarterly, vol. 69, no. 3, pp. 279–294. doi: 10.1111/hequ.12072
Polonetsky, J. & Tene, O. (2014) ‘Who is reading whom now: privacy in education from books to MOOCs’, Vanderbilt Journal of Entertainment & Technology Law, vol. 17, no. 4, pp. 927–990. [online] Available at: https://heinonline.org/HOL/LandingPage?handle=hein.journals/vanep17&div=31&id=&page=
Pomerantz, J., Hank, C. & Sugimoto, C. R. (2015) ‘The state of social media policies in higher education’, PLoS One, vol. 10, no. 5, p. e0127485. doi: 10.1371/journal.pone.0127485.
Purvis, A., Rodger, H. & Beckingham, S. (2016) ‘Engagement or distraction: The use of social media for learning in higher education’, Student Engagement and Experience Journal, vol. 5, no. 1. doi: 10.7190/seej.v5.i1.104
Raiman, L., Antbring, R. & Mahmood, A. (2017) ‘WhatsApp messenger as a tool to supplement medical education for medical students on clinical attachment’, BMC Medical Education, vol. 17, no. 1. doi: 10.1186/s12909-017-0855-x
Regan, P. M. & Jesse, J. (2018) ‘Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking’, Ethics and Information Technology. pp. 167–179. doi: 10.1007/s10676-018-9492-2
Reidenberg, J. R., et al., (2015) ‘Disagreeable privacy policies: mismatches between meaning and users’ understanding’, Berkeley Technology Law Journal, vol. 30, p. 39. [online] Available at: https://www.jstor.org/journal/berktechlawj?refreqid=excelsior%3A58e6bcb3a0072224316cfbddc06200f1
Saarinen, T. (2008) ‘Position of text and discourse analysis in higher education policy research’, Studies in Higher Education, vol. 33, no. 6, pp. 719–728. doi: 10.1080/03075070802457090
Shon, H. & Smith, L. (2011) ‘A review of poll everywhere audience response system’, Journal of Technology in Human Services, vol. 29, no. 3, pp. 236–245. doi: 10.1080/15228835.2011.616475
Tan, K. (2009) ‘Variation theory and the different ways of experiencing educational policy’, Educational Research for Policy and Practice, vol. 8, no. 2, pp. 95–109. doi: 10.1007/s10671-008-9060-3
Voce, J. (2015) ‘Reviewing institutional policies for electronic management of assessment’, Higher Education, vol. 69, no. 6, pp. 915–929. doi: 10.1007/s10734-014-9813-2
Walker, R., et al., (2014) 2014 Survey of Technology Enhanced Learning for Higher Education in the UK, [online] Available at: http://www.ucisa.ac.uk/~/media/groups/dsdg/Tel%202014%20Final%2018%20August.ashx
Weller, M. (2010) ‘The centralisation dilemma in educational IT’, International Journal of Virtual and Personal Learning Environments, vol. 1, no. 1, pp. 1–9. doi: 10.4018/jvple.2010091701
1 Note that for copyright reasons and to preserve anonymity, quotations could not be reproduced from these artefacts. Instead, the examples presented throughout are fabricated, but based on actual statements.
This work is licensed under a Creative Commons Attribution 4.0 International License.Authors contributing to Research in Learning Technology retain the copyright of their article and at the same time agree to publish their articles under the terms of the Creative Commons CC-BY 4.0 License (http://creativecommons.org/licenses/by/4.0/) allowing third parties to copy and redistribute the material in any medium or format, and to remix, transform, and build upon the material, for any purpose, even commercially, under the condition that appropriate credit is given, that a link to the license is provided, and that you indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.